An Intelligent Cloud Security System for Critical Applications

  • Balamurugan Balusamy
  • P. Venkatakrishna
  • Gomathi Palani
  • Umamageshwari Ravikumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)


Cloud has proven to a cost-effective technology for computing and storage for IT industry. Cloud security has often referred as app security and used to solve the communication issues between the cloud user and the cloud. Cloud security technology will be more attentive. While transforming critical application into a cloud, there is a need for a privacy and security. Cloud technology has not yet compromised with the security especially malicious insider. This paper introduces a novel idea, an intelligent agent system, which is used for an automated security. Whenever there is an alert of hackers/snoopers, the secret intelligent agent will be automatically generated to secure the data from malicious insider attacks. This paper has validated using weighted undirected mathematical model.


Cloud system Intelligent system Malicious insider 


  1. 1.
    G. Boss, P. Malladi, D. Quan, L. Legregni, H. Hall, Cloud computing (2007),
  2. 2.
  3. 3.
    R. Piplode, U.K. Singh, An overview and study of security Issues and challenges in cloud computing. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2, 115–120 (2012) Google Scholar
  4. 4.
    D. Chen, H. Zhao, Data security and privacy protection issues in cloud computing, in 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 647, 651Google Scholar
  5. 5.
    C.-L. Tsai, U.-C. Lin, A.Y. Chang, C.-J. Chen, Information security issue of enterprises adopting the application of cloud computing, in 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM), 2010, pp. 645, 649Google Scholar
  6. 6.
    A.J. Duncan, S. Creese, M. Goldsmith, Insider attacks in cloud computing, in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 857, 862Google Scholar
  7. 7.
    S. Shrum, P. Murray, Common Risks of Using Business Apps in the Cloud. Carnegie Mellon University, Produced for US-CERT, a government organization (2012)Google Scholar
  8. 8.
    S.J. Stolfo, M.B. Salem, A.D. Keromytis, Fog computing: mitigating insider data theft attacks in the cloud. Security and Privacy Workshops (SPW) 2012 IEEE Symposium on, 24–25 May 2012 (Angel Diaz, Chris Ferris, IBM’s open cloud architecture, 2013), pp. 125, 128Google Scholar
  9. 9.
    Easy Deployment of Mission Critical Application to the Cloud—GigaSpace CloudifiesGoogle Scholar
  10. 10.
    L.D.D. Babu, A. Gunasekaran, P.V. Krishna, A decision based pre-emptive fair scheduling strategy to process cloud computing work-flows for sustainable enterprise management. Int. J. Bus. Inf. Syst. 16, 409–430 (Inderscience Publishers) (2013)Google Scholar
  11. 11.
    D. Catteddu, G. Hogben, Benefits, Risks and Recommendations for Information Security (2009)Google Scholar
  12. 12.
    Cloud Reference Architecture. An Oracle White Paper November (2012)Google Scholar
  13. 13.
    S. Horrow, S. Gupta, A. Sardana, A. Abraham, Secure private cloud architecture for mobile infrastructure as a service, in 2012 IEEE Eighth World Congress on Services (SERVICES), 2012, pp. 149, 154Google Scholar
  14. 14.
    Y. Demchenko, M.X. Makkes, R. Strijkers, C. Ngo, Intercloud Architecture for Interoperability and Integration. System and Network Engineering Group UvA (2012)Google Scholar
  15. 15.
    Architecture for Managing Clouds. A White Paper from the Open Cloud Standards IncubatorGoogle Scholar
  16. 16.
    J.M. Suri, B.K. Nath, Communication Services in Cloud Computing Environment. Telecommunication Servicing Centre (2011) Google Scholar
  17. 17.
    B. Panja et al., Monitoring and managing cloud computing security using denial of service bandwidth allowance. Recent Patents Comput. Sci. 6, 73–81 (2013)Google Scholar
  18. 18.
    E.E. Schultz, A framework for understanding and predicting insider attacks. Comput. Secur. 21, 526–531 (2002)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Balamurugan Balusamy
    • 1
  • P. Venkatakrishna
    • 1
  • Gomathi Palani
    • 1
  • Umamageshwari Ravikumar
    • 1
  1. 1.VIT UniversityVelloreIndia

Personalised recommendations